期刊文献+

一种用于图像篡改定位与恢复的双水印算法

A Dual Watermarking Algorithm for Image Tamper Orientation and Recovery
下载PDF
导出
摘要 引入虚拟水印的概念,结合自恢复技术,小波变换等水印技术,提出了一种新的数字图像双水印嵌入算法。文中将原图像二次小波变换后的低频分量LL2作为第一重水印,将数字产品公司标识作为第二重水印,同时利用双水印技术所特有的属性,在两重水印之间构筑函数关系,将其结合在一起。实验结果表明,该算法简单高效,可同时具有水印恢复、版权认证和篡改区定位恢复等多方面的功能。 The concept of virtual watermark is introduced.A new digital image algorithm of double watermark is proposed on the basis of such watermarking technologies as self-restoring and wavelet transform.After the second wavelet transforming of the original image,the low-frequency part turns into the first watermark,and the digital product company is labeled as the second watermark.Then,this algorithm takes advantage of the characteristic of the dual watermarking algorithm to set up a mapping between two watermarks.The experiment results show that the algorithm is simple and efficient,and has such functions as watermark recovery,authentication of copyright,tamper orientation and recovery.
作者 李文 李宏昌
出处 《电子科技》 2012年第3期8-10,共3页 Electronic Science and Technology
关键词 虚拟水印 自恢复技术 双重数字水印 virtual watermark self-restoring technology dual watermarking
  • 相关文献

参考文献9

  • 1QU Z,JIN C.Self restoring dual watermarking technology[DB/OL].(2007-04-10)[2011-10-11].http://www.ieeesose2007.org/aduanceprogram.pdf.
  • 2JIN C,QU Z G,ZHANG Z M,et al.Web watermarking tech-nology vaing an xml document[J].Institution of Engineer-ing and Technology,2007,1(1):37-42.
  • 3FRATTOLILLO F,D'ONOFRIO S.An image watermarkingprocedure based on xml documents[DB/OL].(2006-10-05)[2011-10-20].http://www.springerlink.com.
  • 4FRATTOLILLO F,D'ONOFRIO S.A video watermarking pro-cedure based on XML documents[C].In Proceedings ofICIAP.2005,568-575.
  • 5刘泉 江雪梅.用于图像窜改定位和恢复的分层半脆弱数字水印算法.通信学报,2007,:104-110.
  • 6PODILCHUK C I,ZENG W J.Image adaptive watermarkingusing visual models[J].IEEE Journal on Selected Areas inCommunications,1998,16(4):525-539.
  • 7CELIK M U.Hierarchical watermarking for secure image au-thentication with localization[J].IEEE Trans on Image Pro-cessing,200,211(6):585-595.
  • 8瞿治国,金聪.一种稳健的可恢复双重数字水印技术[J].武汉大学学报(理学版),2007,53(3):314-318. 被引量:6
  • 9苏庆堂,刘贤喜.一种新的图像窜改检测与自恢复算法[J].计算机应用研究,2009,26(10):3938-3940. 被引量:1

二级参考文献21

  • 1COX I J, KILIAN J, LEIGHTON F T, et al. Secure spread spectrum watermarking for multimedia [J]. IEEE Trans on Image Processing, 1997, 6 ( 12 ) : 1673-1687.
  • 2FRIEDMAN G L. The trustworthy camera: restoring credibility to photographic image [J].IEEE Trans on Consumer Electronics, 1993, 39(4) :905-910.
  • 3BARRETO P S L. M, KIM H Y, RIJMEN V. Toward secure public key block wise fragile authentication watermarking [J]. IEEE Proceedings of Vision, Image and Signal Processing, 2002, 149 (2) :57-62.
  • 4LEE S K, HO Y S. Fragile watermarking scheme using a simple genetic algorithm [ C ]//Proc of International Conference on Consumer Electronics. 2002: 190-191.
  • 5WU Chuan-fu, HSIEH W S. Image refining technique using digital watermarking [ Jl. IEEE Trans on Consumer Electronics, 2000, 46(1) : 1-5.
  • 6CELIK M U. Hierarchical watermarking for secure image authentication with localization [ J ]. IEEE Trans on Image Processing, 2002, 11 (6) : 585-595.
  • 7LIN P L, HSIEH C K,HUANG P W. A hierarchical digital watermarking method for image tamper detection and recovery [ J]. Pattern Recognition ,2005, 38( 11 ) :2519-2529.
  • 8Mohanty S P,Ramakrishnan K R,Kankanhall M.A Dual Watermarking Technique for Images[D/OL].[2006-10-9].http://portal.acm.org/citation.cfm?id=319891.
  • 9Lie W N,Hsu T L,Lin G S.Verification of Image Content Integrity by Using Dual Watermarking On Wavelets Domain[DB/OL].[2006-10-9].http://ieeexplore.ieee.org/iel5/8824/27931/01246723.pdf.
  • 10Barni M,Bartolini F.Data Hiding for Fighting Piracy[J].IEEE Signal Processing Magazinee,2004,21(2):28-39.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部